mirror of
https://github.com/FiloSottile/mkcert.git
synced 2026-04-25 05:26:03 +03:00
[GH-ISSUE #469] Doesn't work with Synology nginx as it doesn't have a name #296
Labels
No labels
TLS stack issue
Windows
bug
duplicate
duplicate
enhancement
help wanted
help wanted
pull-request
question
question
root store
waiting for info
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/mkcert#296
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @rightsaidfred99 on GitHub (Sep 22, 2022).
Original GitHub issue: https://github.com/FiloSottile/mkcert/issues/469
Environment
mkcert -version): 1.4.4What you did
I can import the certificates into Synology's nginx UI. It loads okay
What went wrong
The problem occurs as the certificate generated doesn't have a name. so you can add domains and subdomains with Synology's UI. I propose that it just ads a title/name to the certificate.
@rightsaidfred99 commented on GitHub (Sep 22, 2022):
Sorry, by title - I mean "Issued To" field which Synology requires.
@android10 commented on GitHub (Oct 7, 2022):
@rightsaidfred99 I'm interested in this one. Where can you see Synology requirements? Maybe with that in mind we can contribute with a PR here.
@elexx commented on GitHub (Jan 16, 2023):
I was not able to find any official certificate requirements by Synology, but I noticed the subject CommonName was not set by mkcert. After setting a CN, Synology accepts the generated certificates. I just pushed an PR to add this.
@elexx commented on GitHub (Jan 16, 2023):
This problem seems btw very similar to https://github.com/FiloSottile/mkcert/issues/47 where iOS would not accept the rootCA if CN was not set.
@pzmarzly commented on GitHub (Oct 24, 2024):
I found that once you have rootCA.pem and rootCA-key.pem generated by mkcert, you can use these commands to generate the certificate that can be used by DSM (Synology OS)